¾Æ·¡ÀÇ ³»¿ëÀº COBIT Mapping - Overviewof International IT Guidance, 2nd Edition °¡¿îµ¥ ÀϺΠ¹ßÃéÇÏ¿© ¹ø¿ªÇÑ °ÍÀÔ´Ï´Ù.
FIPS PUB 200 (Federal Information Processing Standards Publication 200: ¿¬¹æ Á¤º¸ ó¸® Ç¥ÁØ °£Çà 200)
¹®¼ ºÐ·ù
¿¬¹æ Á¤º¸ ó¸® Ç¥ÁØ °£Çà 200 ¡®¿¬¹æ Á¤º¸¿Í Á¤º¸ ½Ã½ºÅÛÀ» À§ÇÑ ÃÖ¼Ò º¸¾È ¿ä°Ç¡¯Àº ¹Ì±¹ ±¹°¡ Ç¥ÁØÀÌ´Ù. ÀÌ°ÍÀº 2006³â 3¿ù¿¡ ¹ßÇàµÇ¾ú´Ù.
¹ßÇàÀÚ
±¹°¡ Ç¥ÁØ ¹× ±â¼ú Çùȸ(NIST: National Institute of Standards and Technology)ÀÇ ÄÄÇ»ÅÍ º¸¾È º»ºÎ, ¹Ì±¹ »ó¹«¼ºÀÇ ºÎ¼, °¡ ÀÌ Ç¥ÁØÀ» °øÇ¥ÇÏ¿´´Ù. ÀÌ°ÍÀº ¿¬¹æ Á¤º¸ º¸¾È Ç¥ÁØ °ü¸®¹ý(FISMA: Federal Information Security Management Act) Á¦Á¤¿¡ ¸ÂÃç¼ NIST¿¡¼ °³¹ßÇÑ ÀÏ·ÃÀÇ º¸¾È Ç¥ÁØ ¹× Áöħ °¡¿îµ¥ ÇϳªÀÌ´Ù.
Ç¥ÁØÀÇ ¸ñÇ¥
ÀÌ Ç¥ÁØÀº ¹Ì±¹ ¿¬¹æ Á¤º¸¿Í Á¤º¸ ½Ã½ºÅÛÀ» À§ÇÑ º¸¾È ¿ä°Ç¿¡ ´ëÇÑ ÃÖ¼Ò ¿ä°ÇÀ» ´Ù·ç°í ÀÖ´Ù. ±×°ÍÀº Á¤º¸ º¸¾ÈÀ» À§ÇÑ ÃÖ¼Ò ¼öÁØÀÇ ³ë·Â(due diligence)À» È®¸³ÇÔÀ¸·Î½á ¾ÈÀüÇÑ Á¤º¸ ½Ã½ºÅÛÀÇ °³¹ß, ±¸Çö ±×¸®°í ¿î¿µÀ» ÁõÁø½ÃŲ´Ù. ¶ÇÇÑ ±×°ÍÀº º¸¾È ÅëÁ¦ÀÇ ¼±Á¤°ú ¸í¼¼¸¦ Á¦°øÇÑ´Ù.
ISO/IEC TR 13335 (ISO/IEC ±â¼ú º¸°í¼ 13335)
¹®¼ ºÐ·ù
ISO/IEC TR 13335 ¡®Á¤º¸ ±â¼ú—IT º¸¾È °ü¸® Áöħ¡¯Àº 5°³ ºÎ¹®À¸·Î ³ª´µ¾îÁø ±â¼ú º¸°í¼(TR: Technical Report)ÀÌ´Ù.
¹ßÇàÀÚ
ÀÌ º¸°í¼´Â ISO ¹× IEC¿¡ ÀÇÇØ ¼³¸³µÈ ÇÕµ¿ ±â¼ú À§¿øȸ(Joint Technical Committee 1)ÀÇ ºÎ¼Ó À§¿øȸÀÎ SC 27 (IT º¸¾È À§¿øȸ)¿¡ ÀÇÇØ ¹ßÇàµÇ¾ú´Ù.
Ç¥ÁØÀÇ ¸ñÇ¥
ÀÌ º¸°í¼ÀÇ ¸ñÇ¥´Â IT º¸¾È °ü¸®¿¡ °üÇؼ ¿©·¯ Ãø¸é¿¡¼ °¡À̵带 Á¦°øÇÏ´Â °ÍÀÌ´Ù. ±×°ÍÀº 5°³ ºÎ¹®À¸·Î ³ª´µ¾îÁ® ÀÖ´Ù:
1. Á¤º¸ ¹Ø Åë½Å ±â¼úÀ» À§ÇÑ º¸¾È °³³ä ¹× ¸ðµ¨¿¡ ´ëÇÑ ¼Ò°³¸¦ Á¦°øÇÏ´Â IT º¸¾È °ü¸® ¾÷¹«ÀÇ ´ë¿ä¸¦ ¼Ò°³ÇÑ´Ù.
2. IT º¸¾È ±¸Çö ¹× °ü¸®°¡ Á¾ÇÕÀûÀÎ ¹æ½ÄÀ¸·Î ³íÀǵǾî ÀÖ´Ù.
3. IT º¸¾È °ü¸®¸¦ À§ÇÑ ±â¹ýµéÀÌ Á¦°øµÈ´Ù.
4. °¡À̵å´Â º¸¾È °ü½É»çÇ× ¹× À§Çù»Ó¸¸ ¾Æ´Ï¶ó IT ½Ã½ºÅÛÀÇ ÇüŸ¦ °í·ÁÇÑ º¸È£ÀåÄ¡ÀÇ ¼±Åÿ¡ ´ëÇؼ Á¦½ÃÇÑ´Ù.
5. ³×Æ®¿öÅ© º¸¾ÈÀ» µµÀÔÇÒ °æ¿ì °í·ÁÇØ¾ß ÇÏ´Â Åë½Å °ü·Ã ¿ä¼Ò¸¦ ÆľÇÇÏ°í ºÐ¼®ÇÏ´Â °Í¿¡ °üÇÑ Á¤º¸°¡ Á¦°øµÈ´Ù.
ISO/IEC 15408:2005/COMMON CRITERIA/ITSEC
±¹Á¦ Ç¥ÁØÀÎ ISO/IEC 15408:2005 º¸¾È Å×Å©´Ð—IT º¸¾ÈÀ» À§ÇÑ Æò°¡ ±âÁØÀº Á¤º¸ ±â¼ú º¸¾È Æò°¡¸¦ À§ÇÑ ÀÏ¹Ý ±âÁØ(CC: Common Criteria) 2.0¿¡ ±â¹ÝÇÏ°í ÀÖ¾î¼, ÇϳªÀÇ Àå(chapter) ¾È¿¡¼ ´Ù·ç¾îÁö°í ÀÖ´Ù. ÀÏ¹Ý ±âÁØ(CC)ÀÌ 1991³â À¯·´ ÁýÇàÀ§¿øȸ¿¡¼ Ãâ°£µÈ Á¤º¸ ±â¼ú º¸¾È Æò°¡ ±âÁØ(ITSEC: Information Technology Security Evaluation Criteria)À» °è½ÂÇÑ´Ù. ÀÌµé ¹®¼µéÀÇ À̸§Àº µ¿ÀǾîÀÌ´Ù.
¹®¼ ºÐ·ù
ISO/IEC 15408:2005Àº ±¹Á¦ Ç¥ÁØÀÌ´Ù. CC´Â ¸ÖƼÆÄÆ® Ç¥ÁØ(multipart standard)À¸·Î½á ºÒ¸®¾îÁø´Ù.
¹ßÇàÀÚ
ISO/IEC 15408:2005´Â CC¸¦ ¹ßÇàÇÑ ÀÏ¹Ý ±âÁØ ÇÁ·ÎÁ§Æ® ÈÄ¿ø Á¶Á÷°úÀÇ Çù·ÂÀ¸·Î ISO/IEC JTC 1 ¿öÅ· ±×·ì¿¡ ÀÇÇؼ ¹ßÇàµÇ¾ú´Ù. ÀÌ Á¶Á÷ÀÇ È¸¿øµéÀº ´ÙÀ½ÀÇ ±¹°¡µéÀ» Æ÷ÇÔÇÏ°í, ÇØ´çµÇ´Â ±â°ü/ºÎ¼°¡ ´ëÇ¥ÇÑ´Ù.
• ij³ª´Ù—Communications Security Establishment
• ÇÁ¶û½º—Central Service of the Information System Security
• µ¶ÀÏ—Federal Office for Security in Information Technology
• ³×´ú¶õµå—The Netherlands National Communications Security Agency
• ¿µ±¹—Communications-Electronics Security Group
• ¹Ì±¹—National Institute of Standards and Technology and National Security Agency
Ç¥ÁØÀÇ ¸ñÇ¥
ÀÌ Ç¥ÁØÀº ½Ã½ºÅÛ ¹× Á¦Ç°ÀÇ º¸¾È¿¡ ÃÊÁ¡À» ¸ÂÃç¼ IT º¸¾ÈÀÇ ÀϹÝÀûÀÌ°í ºñ±³°¡´ÉÇÑ Æò°¡¸¦ À§ÇÑ ±â¹ÝÀ¸·Î½á ±âÁØÀ» Á¤ÀÇÇϱâ À§Çؼ ¹ßÇàµÇ¾ú´Ù.
TickIT
¹®¼ ºÐ·ù
TickIT ´Â Á¶Á÷ÀÇ ¼ÒÇÁÆ®¿þ¾î Ç°Áú °ü¸® ½Ã½ºÅÛÀÇ Æò°¡ ¹× ÀÎÁõÀ» À§ÇÑ Ã¼°èÀÌ´Ù.
¹ßÇàÀÚ
TickIT ´Â ¿µ±¹ Ç¥ÁØ ÇùȸÀÇ ÇÑ ºÎ¼ÀÎ TickIT »ç¹«±¹¿¡ ÀÇÇØ ¹ß°£µÇ°í À¯Áö°ü¸®µÈ´Ù.
¹ßÇ๰ ¸ñÇ¥
¼ÒÇÁÆ®¿þ¾î °³¹ßÀÚ´Â ´ÙÀ½¿¡ ´ëÇؼ °í¹ÎÇÒ °æ¿ì ÀÚ½ÅÀ» ¾ò°Ô µÈ´Ù:
• ¼ÒÇÁÆ®¿þ¾î °³¹ß ÇÁ·Î¼¼½º¿¡ º»ÁúÀûÀÎ Ç°Áú
• Ç°Áú ¸ñÀûÀ» ´Þ¼º
• Ç°Áú °ü¸® ½Ã½ºÅÛÀÇ Áö¼ÓÀûÀÎ °³¼±
¸ñÀûÀº Ç°Áú °ü¸® ½Ã½ºÅÛÀÇ È¿À²ÀûÀÎ ÀÎÁõÀ» °¡´ÉÇÏ°Ô ÇÏ´Â ¼ÒÇÁÆ®¿þ¾î °³¹ß °ü¸®¸¦ À§ÇÑ ÇÁ·¹ÀÓ¿öÅ©ÀÇ °³¹ßÀÌ´Ù. ÀÌ ¸ñÀûÀ» ´Þ¼ºÇϱâ À§ÇÏ¿© ´ÙÀ½ÀÇ °úÁ¤µéÀ» ¹â¾Æ¾ß ÇÑ´Ù:
• ISO 9001:2000 ¿ä°ÇÀÇ Çؼ®À» Æí¸®ÇÏ°Ô ÇÏ´Â °¡À̵åÀÇ ÀÛ¼º
• °¨»çÀÎÀÇ Áö½Ä Çâ»ó°ú Àü¹® Áö½Ä°ú ¿ª·®À» Áö´Ñ µî·ÏµÈ °¨»çÀο¡ °üÇÑ Á¤º¸ Á¦°ø
• ¼ÒÇÁÆ®¿þ¾î ºÐ¾ß¸¦ À§ÇÑ Àå·¡°¡ Ã˸ÁÇÑ ÀÎÁõ ±â°üµéÀ» Àΰ¡Çϱâ À§ÇÑ ±ÔÄ¢ÀÇ ÀÛ¼º